3 Bluetooth Name comes from nickname of Danish king Harald BlåtandAllows users to make ad hoc wireless connections between devices like mobile phones, desktop or notebook computers wirelesslyData transfer at a speed of about 720 Kbps within 50 meters (150 feet) of range or beyond through walls, clothing and even luggage bagsBuilt into a small microchipOperates in a globally available frequency band ensuring worldwide interoperabilityManaged and maintained by Bluetooth Special Interest Group

4 Bluetooth ProtocolUses the unlicensed 2.4 GHz ISM (Industrial Scientific and Medical) frequency band79 available channels spaced 1 MHz apart from GHz to GHzAllows power levels starting from 1mW (covering 10 centimetres) to 100mW (covering upto 100 meters) suitable for short device zone to personal area networks within a homeSupports both unicast (point-to-point) and multicast (point-to-multipoint) connectionsBluetooth protocols are a collection of many inter-related protocols

5 Bluetooth Protocol Uses the master and slave relationshipMaster and slaves together form a Piconet when master allows slaves to talkUp to seven ‘slave’ devices can be set to communicate with a ‘master’ in a PiconetScatternet is formed when several of piconets are linked together to form a larger network in an ad hoc manner

6 Bluetooth ProtocolScatternet is a topology where a device from one piconet also acts as a member of another piconet wherein a device being a master in one piconet can simultaneously be a slave in the other one

12 Telephony Control ProtocolsTelephony Control Specification Binary (TCS BIN) - defines the call control signaling protocol and handles mobility management for groups of Bluetooth TCS devicesAttention (AT) Commands - defines a set of commands by which a mobile phone can be used and controlled as a modem for fax and data transfers

13 Adopted ProtocolsPoint-to-Point Protocol (PPP) - means of taking IP packets to/from the PPP layer and placing them onto the LANTransmission Control Protocol/Internet Protocol (TCP/IP) - used for communication across the InternetObject Exchange (OBEX) Protocol - session protocol to exchange objects and used to browse the contents of folders on remote devicesContent Formats - used to exchange messages and notes and synchronize data amongst various devices

14 Bluetooth SecurityOffers security infrastructure starting from authentication, key exchange to encryptionUses the publicly available cipher algorithm known as SAFER+ to authenticate a device’s identity

15 Bluetooth Application ModelsEach application model in Bluetooth is realized through a Profile. Profiles define the protocols and protocol features supporting a particular usage model. Some common profiles are:File TransferInternet BridgeLAN AccessSynchronizationHeadset

16 RFID Radio Frequency IdentificationRadio transponder (known as RFID tags) carrying an ID (Identification) can be read through radio frequency (RF) interfacesTag is attached to the object and data within the tag provides identification for the objectObject could be an entity in a manufacturing shop, goods in transit, item in a retail store, a vehicle in a parking lot, a pet, or a book in a library

17 RFID System Comprises of different functional areas like:Means of reading or interrogating theMechanism to filter some of the dataMeans to communicate the data in the tag with a host computerMeans for updating or entering customized data into the tag

19 RFID tags based on frequencyWorks on six frequencies of KHz, MHz, 433 MHz, 918 MHz, 2.4 GHz and 5.8 GHzLow frequency range tags are slow in data transfer and suitable for slow moving objects, security access, asset tracking and animal identification applicationsHigh frequency range tags offer long reading ranges and high data transfer speed and are used for fast moving objects like railway wagon tracking and identification of vehicles on freeways for automated toll collectionHigher the frequency, higher the data transfer rates

20 RFID tags based on applicationsSpeed of the object and distance to be read determines the type of tag to be usedRFID systems follow contact-less and non line-of-sight nature of the technologyTags can be read at high speedsRFID tag contains two segments of memory - one segment is a factory set and used to uniquely identify a tag while the other one is used by the applicationRead/write capability of a RFID system is an advantage in interactive applications such as work-in-process or maintenance tracking

21 RFID tags based on power levelsTwo types - Active and Passive tagsPassive tags are generally in low frequency rangeTags at higher frequency range can be either active or passive

22 Active TagsPowered by an internal battery and are typically read/writeMemory can vary from a few bytes to 1MBBattery supplied power of an active tag generally gives it a longer read rangeGreater the size, greater the cost and a limited operational life

23 Passive Tags Operate without own power sourceObtains operating power from the reader’s antennaData within a passive tag is read only and generally cannot be changed during operationLighter, less expensive and offer a virtually unlimited operational lifeHave shorter read ranges than active tags and require a high powered readerData is usually 32 to 128 bits long

27 Wireless BroadbandAlso known as Wireless Metropolitan Area Network (Wireless MAN) and Wireless Microwave Access (WiMAX)IEEE standard released in April 2002Offers an alternative to high bandwidth wired access networks like fiber optic, cable modems and DSLProvides network access to buildings through exterior antennas communicating with radio base stationsNetworks can be created in just weeks by deploying a small number of base stations on buildings or poles to create high capacity wireless access systems

29 Sub-standards of IEEEIEEE Air interface for 10 to 66 GHzIEEE Coexistence of broadband wireless access systemsIEEE Air interface for licensed frequencies, 2 to 11 GHz

30 Basics of IEEEIEEE standards are concerned with the air interface between a subscriber’s transceiver station and a base transceiver stationThe Physical LayerMAC LayerConvergence Layer

31 Physical LayerSpecifies the frequency band, the modulation scheme, error-correction techniques, synchronization between transmitter and receiver, data rate and the multiplexing structureBoth TDD and FDD alternatives support adaptive burst profiles in which modulation and coding options may be dynamically assigned on a burst-by-burst basisThree physical layer for services: Wireless MAN-SC2, Wireless MAN-OFDM and Wireless MAN-OFDMA

32 Medium Access Control LayerDesigned for point-to-multipoint broadband wireless accessAddresses the need for very high bit rates, both uplink (to the base station) and downlink (from the base station)Services like multimedia and voice can run as MAC is equipped to accommodate both continuous and bursty traffic

34 Mobile IP‘Mobile IP’ signifies that, while a user is connected to applications across the Internet and the user’s point of attachment changes dynamically, all connections are maintained despite the change in underlying network propertiesSimilar to the handoff/roaming situation in cellular networkMobile IP allows the mobile node to use two IP addresses called home address and care of addressThe home address is static and known to everybody as the identity of the hostThe care of address changes at each new point of attachment and can be thought of as the mobile node’s location specific address

36 Working of Mobile IPLet’s take the case of mobile node (A) and another host (server X). The following steps take place:Server X wants to transmit an IP datagram to node A. The home address of A is advertised and known to X. X does not know whether A is in the home network or somewhere else. Therefore, X sends the packet to A with A’s home address as the destination IP address in the IP header. The IP datagram is routed to A’s home network.

37 Working of Mobile IPAt the A’s home network, the incoming IP datagram is intercepted by the home agent. The home agent discovers that A is in a foreign network. A care of address has been allocated to A by this foreign network and available with the home agent. The home agent encapsulates the entire datagram inside a new IP datagram, with A’s care of address in the IP header. This new datagram with the care of address as the destination address is retransmitted by the home agent.At the foreign network, the incoming IP datagram is intercepted by the foreign agent. The foreign agent is the counterpart of the home agent in the foreign network. The foreign agent strips off the outer IP header, and delivers the original datagram to A.

38 Working of Mobile IPA intends to respond to this message and sends traffic to X. In this example, X is not mobile; therefore X has a fixed IP address. For routing A’s IP datagram to X, each datagram is sent to some router in the foreign network. Typically, this router is the foreign agent. A uses X’s IP static address as the destination address in the IP header.The IP datagram from A to X travels directly across the network, using X’s IP address as the destination address.

39 Working of Mobile IPDiscovery - A mobile node uses a discovery procedure to identify prospective home agents and foreign agents.Registration - A mobile node uses a registration procedure to inform its home agent of its care-of address.Tunneling - Tunneling procedure is used to forward IP datagrams from a home address to a care of address.

41 Cellular IPNone of the nodes know the exact location of a mobile host. Packets addressed to a mobile host are routed to its current base station on a hop-by-hop basis where each node only needs to know on which of its outgoing ports to forward packets. This limited routing information (referred as mapping) is local to the node and does not assume that nodes have any knowledge of the wireless network topology. Mappings are created and updated based on the packets transmitted by mobile hosts.

42 Cellular IPUses two parallel structures of mappings through Paging Caches (PC) and Routing Caches (RC)PCs maintain mappings for stationary and idle (not in data communication state) hostsRC maintains mappings for mobile hostsMapping entries in PC have a large timeout interval, in the order of seconds or minutes. RCs maintain mappings for mobile hosts currently receiving data or expecting to receive data

45 IPv6 There are global addresses and local addressesGlobal addresses are used for routing of global InternetLink local addresses are available within a subnetIPv6 uses hierarchical addressing with three level of addressesIncludes a Public Topology (the 48 bit external routing prefix)Site Topology (typically a 16 bit subnet number)Interface Identifier (typically an automatically generated 64 bit number unique on the local LAN segment)

47 IPv6 SecurityComes native with a security protocol called IP Security (IPSec)IPSec protocol is a standards-based method of providing privacy, integrity and authenticity to information transferred across IP networks

48 Features of IPSecDiffie-Hellman key exchange mechanism for deriving key between peers on a public networkPublic key cryptography to guarantee the identity of the two parties and avoid man-in-the-middle attacksBulk encryption algorithms, such as 3DES, for encrypting the dataKeyed hash algorithms, such as HMAC, combined with traditional hash algorithms such as MD5 or SHA for providing packet authenticationDigital certificates signed by a certificate authority to act as digital ID cardsIPSec provides IP network layer encryption

49 Migrating from IPv4 to IPv6Migration of the network components to be able to support IPv6 packets. Using IP tunneling, IPv6 packets can propagate over an IPv4 envelope. Existing routers can support IP tunneling.Migration of the computing nodes in the network. This will need the operating system upgrades so that they support IPv6 along with IPv4. Upgraded systems will have both IPv4 and IPv6 stacks.Migration of networking applications in both client and server systems. This requires porting of the applications from IPv4 to IPv6 environment.

50 Interconnecting IPv6 networksTunneling is one of the key deployment strategies for both service providers as well as enterprises during the period of IPv4 and IPv6 coexistence.Tunneling service providers can offer an end-to-end IPv6 service without major upgrades to the infrastructure and without impacting current IPv4 services.

51 Tunneling MechanismsManually created tunnels such as IPv6 manually configured tunnels (RFC 2893)IPv6 over IPv4 tunnelsSemiautomatic tunnel mechanisms such as that employed by tunnel broker servicesFully automatic tunnel mechanisms such as IPv4 compatible

52 Mobile IP with IPv6IPv6 with hierarchical addressing scheme can manage IP mobility much efficiently.IPv6 also attempts to simplify the process of renumbering which could be critical to the future routing of the Internet traffic.Mobility Support in IPv6, as proposed by the Mobile IP working group, follows the design for Mobile IPv4. It retains the ideas of a home network, home agent and the use of encapsulation to deliver packets from the home network to the mobile node’s current point of attachment.While discovery of a care of address is still required, a mobile node can configure its a care of address by using Stateless Address Auto-configuration and Neighbor Discovery. Thus, foreign agents are not required to support mobility in IPv6.

53 Java Card Smart card with Java frameworkSmart card is a plastic card with intelligence and memoryA smart card is embedded with either (i) a microprocessor and a memory chip or (ii) only a memory chip with non-programmable logicA microprocessor card can have an intelligent program resident within the card which can add, delete, and otherwise manipulate information on the cardA memory card can store some information for some pre-defined operation

54 Java Card Java was chosen as the vehicle for interoperabilityAll the microprocessor based smart cards now offer Java API framework on the smart cardJava Card technology preserves many of the benefits of the Java programming languages such as productivity, security, robustness, tools, and portabilityFor Java card, the Java Virtual Machine ( JVM), the language definition, and the core packages have been made more compact to bring Java technology to the resource constrained smart cards

56 Functioning of Java CardJava card technology supports OTA (Over The Air) downloadsApplications written for the Java Card platform are referred to as appletsChallenge of Java Card technology on smart card is to fit Java system software in a resource constraint smart card while conserving enough space for applicationsThe Java Card virtual machine on a smart card is split into two parts; one that runs off-card and the other that runs on-card

57 Functioning of Java CardMany processing tasks that are not constrained to execute at run time, such as class loading, bytecode verification, resolution and linking, and optimization, are dedicated to the virtual machine that is running off-card where resources are usually not a concernThe on-card components of Java Card include components like the Java card virtual machine ( JCVM), the Java card runtime environment ( JCRE), and the Java APITask of the compiler is to convert a Java source into Java class filesThe converter will convert class files into a format downloadable into the smart card while ensuring the byte code validity

59 Functioning of Java CardFollowing conversion by the off-card VM into CAP (Converted APlet) format, the applet is transferred into the card using the installerApplet is selected for execution by the JCREJCRE is made up of the on-card virtual machine and the Java Card API classes and performs additional runtime security checks through applet firewallApplet firewall partitions the objects stored into separate protected object spaces, called contexts and controls the access to shareable interfaces of these objectsIt is then executed on JVCM which is scaled down version of standard JVM ( Java Virtual Machine)

60 Global System for Mobile Communications (GSM)Next ChapterGlobal System for Mobile Communications (GSM)Thanks